Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions

From MaRDI portal
Publication:5199207

DOI10.1007/978-3-642-22792-9_26zbMath1287.94085OpenAlexW2150624282MaRDI QIDQ5199207

Daniele Micciancio, Petros Mol

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_26




Related Items

Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreTightly secure signatures from lossy identification schemesApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsNaor-Yung paradigm with shared randomness and applicationsObfuscated fuzzy Hamming distance and conjunctions from subset product problemsLattice-based accumulator with constant time list update and constant time verificationOn the hardness of module learning with errors with short distributionsZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsCandidate witness encryption from lattice techniquesQuantum search-to-decision reduction for the LWE problemA detailed analysis of Fiat-Shamir with abortsAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelIndistinguishability obfuscationCryptographic group actions and applicationsOn the tightness of forward-secure signature reductionsDeterministic compression with uncertain priorsLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsA lattice-based group signature scheme with verifier-local revocationImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distancePseudo-free families of finite computational elementary abelian \(p\)-groupsTighter Reductions for Forward-Secure Signature SchemesPrivate Puncturable PRFs from Standard Lattice AssumptionsOn the structure of Boolean functions with small spectral normThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsWatermarking cryptographic functionalities from standard lattice assumptionsOn the Hardness of Learning with Rounding over Small ModulusDecompositions of Triangle-Dense GraphsMulti-theorem preprocessing NIZKs from latticesVerifiable single-server private information retrieval from LWE with binary errorsMultiparty reusable non-interactive secure computation from LWEThe Geometry of Lattice CryptographyShorter lattice-based zero-knowledge proofs via one-time commitmentsHow (Not) to Instantiate Ring-LWEFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityLattice-based group signatures: achieving full dynamicity (and deniability) with easeLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNUnnamed ItemTightly secure signature schemes from the LWE and subset sum assumptionsRounding in the ringsHardness of LWE on general entropic distributionsKey-homomorphic pseudorandom functions from LWE with small modulus